ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-1207ED2BADAC
|
Infrastructure Scan
ADDRESS: 0x777777651a6097a97de9a57571945ae8d445a341
DEPLOYED: 2026-05-11 20:36:23
LAST_TX: 2026-05-11 21:29:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Fetching raw bytecode for 0x777777651a6097a97de9a57571945ae8d445a341… [FETCH] Metadata hash (IPFS): 03e0c922…9e4e72b3… [SCAN] Mapping ownership-protected functions… [MEM] Tracking pointer 0xaa3b12dc in memory heap. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] State change detected in slot 0xbe. [TRACE] Bytecode segment 0xb3 analysed. [VALID] Generating cryptographic proof of scan… [DONE] Log signature: 85218bdee7a76acc25fa1dd87ad4db39d9a1cce43bc98a42c37a38d5fbbba2c7.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xaf554a35781bf00cb45848a96d93bed7131f0ea0 0xcd91c4e7da0c5d2f5c5fd5c20d355af0c8cae590 0x5b0a0766904ae859010b46c5c9c7be646e510a0f 0x45d9d9ea09edcae68d8e954811cacd89014d78b2 0xd09327759a74e448d8926441204880921c6d67cc 0xd7ae98285461e145f76f8ee4127e353832aa19c9 0x7568f30154981ef5f37779d0fc7a4621f0304032 0xa793a02aa769dd0e84731e7e5184c0043f98e4bb 0x3efe5f5bcff70e9882f3b4526073ae88e71d0800 0x91a71f346e57e9a089e4dff01a54285646791689 0x44f0b68aaa332ea1b18486777ae4a3895cdfd620 0xd1c75306e15a9d441026ca559c6bd51e769639c9 0x9c850eb4dd3aaac7fa029904941da52eef6335b3 0xa52da5942989d323069b16b9950343243eac150b 0x1e5adf70321ca28b3ead70eac545e6055e969e6f 0xdef00bfa9b0a19166056f869d4ee7f5813293821 0x9cb842080b76c2c5614d0a7a1a577826149d6498 0x11ed8c5078810aefaeb38a11f558e91e22c4c4d0 0x36726fec0d46b9cbef84a77d3b7e4e8d614a0ff4 0xf19717ad375112e096f7c60cd3fee6c7cc037ea0
